Search for vulnerabilities
Vulnerability details: VCID-esqn-fb6x-aaam
Vulnerability ID VCID-esqn-fb6x-aaam
Aliases CVE-2020-26301
GHSA-652h-xwhf-q4h6
Summary Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2021:4845
cvssv3 5.4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26301.json
epss 0.02824 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.02824 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.03948 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.03948 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.04166 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.04166 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.04166 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05066 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05783 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05783 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05783 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05783 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05783 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05783 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05783 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.05783 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
epss 0.16773 https://api.first.org/data/v1/epss?cve=CVE-2020-26301
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=2006958
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-652h-xwhf-q4h6
cvssv3.1 7.5 https://github.com/mscdex/ssh2
generic_textual HIGH https://github.com/mscdex/ssh2
cvssv3.1 7.5 https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21
generic_textual HIGH https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2020-26301
cvssv3 10.0 https://nvd.nist.gov/vuln/detail/CVE-2020-26301
cvssv3.1 10.0 https://nvd.nist.gov/vuln/detail/CVE-2020-26301
cvssv3.1 7.5 https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2
generic_textual HIGH https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2
cvssv3.1 7.5 https://www.npmjs.com/package/ssh2
generic_textual HIGH https://www.npmjs.com/package/ssh2
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26301.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N Found at https://github.com/mscdex/ssh2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N Found at https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2020-26301
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-26301
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2020-26301
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N Found at https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N Found at https://www.npmjs.com/package/ssh2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.90394
EPSS Score 0.02824
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.